Custom Login Branding Security & Risk Analysis

wordpress.org/plugins/custom-login-branding

Customize the wordpress login branding

10 active installs v1.0 PHP + WP 3.0.1+ Updated Oct 28, 2010
adminbrandingcustomizationcustomizelogin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Login Branding Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Login Branding has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "custom-login-branding" plugin v1.0 exhibits a seemingly strong security posture based on the provided static analysis. The absence of identified attack surface points like AJAX handlers, REST API routes, shortcodes, and cron events is a positive indicator, suggesting a limited footprint for potential exploitation. Furthermore, the code signals show no dangerous functions or SQL queries that aren't prepared, and there are no external HTTP requests or file operations to worry about. This indicates good development practices in these specific areas.

However, a significant concern arises from the 100% of output operations being unescaped. This presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities if any user-provided data or dynamic content is displayed without proper sanitization. While taint analysis found no issues, this is likely due to the limited analysis performed (0 flows analyzed). The lack of nonce and capability checks is also concerning, as it means even if there were entry points, they might lack essential authentication and authorization mechanisms.

Despite the clean vulnerability history, which is encouraging, it doesn't negate the risks identified in the code analysis. The absence of known vulnerabilities could be due to the plugin's simplicity or lack of extensive auditing. The primary risk remains the unescaped output, which is a direct pathway to XSS attacks. A balanced conclusion is that while the plugin avoids common pitfalls like raw SQL or dangerous functions, the significant oversight in output escaping creates a substantial security weakness that needs immediate attention.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Custom Login Branding Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Custom Login Branding Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 16, 2026

Custom Login Branding Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Custom Login Branding Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionlogin_headcustom-login-branding.php:38
filterlogin_headerurlcustom-login-branding.php:39
filterlogin_headertitlecustom-login-branding.php:40
Maintenance & Trust

Custom Login Branding Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedOct 28, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Custom Login Branding Developer Profile

drahkar

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Login Branding

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-login-branding/custom-login-branding.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom Login Branding